First published: Tue Feb 25 2025(Updated: )
A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1674 is classified as a high-severity vulnerability due to its potential for allowing out of bounds reads.
To fix CVE-2025-1674, implement proper input validation to mitigate the effects of malicious or malformed packets.
CVE-2025-1674 affects versions of the Zephyr project up to and including 4.0.
CVE-2025-1674 is a vulnerability due to lack of input validation which leads to out of bounds reads.
Exploitation of CVE-2025-1674 can lead to unauthorized data access or system instability.